Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    8s
  • max time network
    7s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 13:24 UTC

General

  • Target

    dControl.exe

  • Size

    447KB

  • MD5

    58008524a6473bdf86c1040a9a9e39c3

  • SHA1

    cb704d2e8df80fd3500a5b817966dc262d80ddb8

  • SHA256

    1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326

  • SHA512

    8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31

  • SSDEEP

    6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 4 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dControl.exe
    "C:\Users\Admin\AppData\Local\Temp\dControl.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\dControl.exe
      C:\Users\Admin\AppData\Local\Temp\dControl.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\dControl.exe
        "C:\Users\Admin\AppData\Local\Temp\dControl.exe" /TI
        3⤵
        • Modifies security service
        • Windows security modification
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2756
  • C:\Windows\system32\makecab.exe
    "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240824132500.log C:\Windows\Logs\CBS\CbsPersist_20240824132500.cab
    1⤵
      PID:2880
    • C:\Windows\system32\gpscript.exe
      gpscript.exe /RefreshSystemParam
      1⤵
        PID:2820

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\3b0b1v2e.tmp

        Filesize

        37KB

        MD5

        3bc9acd9c4b8384fb7ce6c08db87df6d

        SHA1

        936c93e3a01d5ae30d05711a97bbf3dfa5e0921f

        SHA256

        a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79

        SHA512

        f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375

      • C:\Users\Admin\AppData\Local\Temp\dControl.ini

        Filesize

        2KB

        MD5

        9758ec5b0f257fc6b436fcc046be8a0c

        SHA1

        0793ad5b0c02f1587106ac4227ad7c1c8e0ce551

        SHA256

        b473028cecb8e902c873a8fc90617350bb18137b129ed1e9ec2180b284112e25

        SHA512

        e760e2e214e60936e51e63f23d476846116481224f508b8e162e1253be6ba2f66c7da84e2424d2ffc62c80ea2522f53f0fd6ab179e23c2d421a78035a309e95c

      • C:\Windows\System32\GroupPolicy\gpt.ini

        Filesize

        233B

        MD5

        cd4326a6fd01cd3ca77cfd8d0f53821b

        SHA1

        a1030414d1f8e5d5a6e89d5a309921b8920856f9

        SHA256

        1c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c

        SHA512

        29ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67

      • C:\Windows\Temp\autC275.tmp

        Filesize

        14KB

        MD5

        9d5a0ef18cc4bb492930582064c5330f

        SHA1

        2ec4168fd3c5ea9f2b0ab6acd676a5b4a95848c8

        SHA256

        8f5bbcc572bc62feb13a669f856d21886a61888fd6288afd066272a27ea79bb3

        SHA512

        1dc3387790b051c3291692607312819f0967848961bc075799b5a2353efadd65f54db54ddf47c296bb6a9f48e94ec83086a4f8bf7200c64329a73fc7ec4340a4

      • C:\Windows\Temp\autC276.tmp

        Filesize

        12KB

        MD5

        efe44d9f6e4426a05e39f99ad407d3e7

        SHA1

        637c531222ee6a56780a7fdcd2b5078467b6e036

        SHA256

        5ea3b26c6b1b71edaef17ce365d50be963ae9f4cb79b39ec723fe6e9e4054366

        SHA512

        8014b60cef62ff5c94bf6338ee3385962cfc62aaa6c101a607c592ba00aea2d860f52e5f52be2a2a3b35310f135548e8d0b00211bfcf32d6b71198f5d3046b63

      • C:\Windows\Temp\autC277.tmp

        Filesize

        7KB

        MD5

        ecffd3e81c5f2e3c62bcdc122442b5f2

        SHA1

        d41567acbbb0107361c6ee1715fe41b416663f40

        SHA256

        9874ab363b07dcc7e9cd6022a380a64102c1814343642295239a9f120cb941c5

        SHA512

        7f84899b77e3e2c0a35fb4973f4cd57f170f7a22f862b08f01938cf7537c8af7c442ef2ae6e561739023f6c9928f93a59b50d463af6373ed344f68260bc47c76

      • memory/1704-23-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/1704-44-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/2756-45-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/3012-0-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      • memory/3012-22-0x0000000000400000-0x00000000004CD000-memory.dmp

        Filesize

        820KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.